1/* 2 * MMS protocol over TCP 3 * Copyright (c) 2006,2007 Ryan Martell 4 * Copyright (c) 2007 Bj��rn Axelsson 5 * Copyright (c) 2010 Zhentan Feng <spyfeng at gmail dot com> 6 * 7 * This file is part of FFmpeg. 8 * 9 * FFmpeg is free software; you can redistribute it and/or 10 * modify it under the terms of the GNU Lesser General Public 11 * License as published by the Free Software Foundation; either 12 * version 2.1 of the License, or (at your option) any later version. 13 * 14 * FFmpeg is distributed in the hope that it will be useful, 15 * but WITHOUT ANY WARRANTY; without even the implied warranty of 16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU 17 * Lesser General Public License for more details. 18 * 19 * You should have received a copy of the GNU Lesser General Public 20 * License along with FFmpeg; if not, write to the Free Software 21 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA 22 */ 23 24/* References 25 * MMS protocol specification: 26 * [1]http://msdn.microsoft.com/en-us/library/cc234711(PROT.10).aspx 27 * ASF specification. Revision 01.20.03. 28 * [2]http://msdn.microsoft.com/en-us/library/bb643323.aspx 29 */ 30 31#include "avformat.h" 32#include "mms.h" 33#include "internal.h" 34#include "avio_internal.h" 35#include "libavutil/intreadwrite.h" 36#include "libavcodec/bytestream.h" 37#include "network.h" 38#include "url.h" 39 40#define LOCAL_ADDRESS 0xc0a80081 // FIXME get and use correct local ip address. 41#define LOCAL_PORT 1037 // as above. 42/** Client to server packet types. */ 43typedef enum { 44 CS_PKT_INITIAL = 0x01, 45 CS_PKT_PROTOCOL_SELECT = 0x02, 46 CS_PKT_MEDIA_FILE_REQUEST = 0x05, 47 CS_PKT_START_FROM_PKT_ID = 0x07, 48 CS_PKT_STREAM_PAUSE = 0x09, 49 CS_PKT_STREAM_CLOSE = 0x0d, 50 CS_PKT_MEDIA_HEADER_REQUEST = 0x15, 51 CS_PKT_TIMING_DATA_REQUEST = 0x18, 52 CS_PKT_USER_PASSWORD = 0x1a, 53 CS_PKT_KEEPALIVE = 0x1b, 54 CS_PKT_STREAM_ID_REQUEST = 0x33, 55} MMSCSPacketType; 56 57/** Server to client packet types. */ 58typedef enum { 59 /** Control packets. */ 60 /*@{*/ 61 SC_PKT_CLIENT_ACCEPTED = 0x01, 62 SC_PKT_PROTOCOL_ACCEPTED = 0x02, 63 SC_PKT_PROTOCOL_FAILED = 0x03, 64 SC_PKT_MEDIA_PKT_FOLLOWS = 0x05, 65 SC_PKT_MEDIA_FILE_DETAILS = 0x06, 66 SC_PKT_HEADER_REQUEST_ACCEPTED = 0x11, 67 SC_PKT_TIMING_TEST_REPLY = 0x15, 68 SC_PKT_PASSWORD_REQUIRED = 0x1a, 69 SC_PKT_KEEPALIVE = 0x1b, 70 SC_PKT_STREAM_STOPPED = 0x1e, 71 SC_PKT_STREAM_CHANGING = 0x20, 72 SC_PKT_STREAM_ID_ACCEPTED = 0x21, 73 /*@}*/ 74 75 /** Pseudo packets. */ 76 /*@{*/ 77 SC_PKT_CANCEL = -1, 78 SC_PKT_NO_DATA = -2, 79 /*@}*/ 80 81 /** Data packets. */ 82 /*@{*/ 83 SC_PKT_ASF_HEADER = 0x010000,// make it bigger than 0xFF in case of 84 SC_PKT_ASF_MEDIA = 0x010001,// receiving false data packets. 85 /*@}*/ 86} MMSSCPacketType; 87 88typedef struct { 89 MMSContext mms; 90 int outgoing_packet_seq; ///< Outgoing packet sequence number. 91 char path[256]; ///< Path of the resource being asked for. 92 char host[128]; ///< Host of the resources. 93 int incoming_packet_seq; ///< Incoming packet sequence number. 94 int incoming_flags; ///< Incoming packet flags. 95 int packet_id; ///< Identifier for packets in the current stream. 96 unsigned int header_packet_id; ///< default is 2. 97} MMSTContext; 98 99/** Create MMST command packet header */ 100static void start_command_packet(MMSTContext *mmst, MMSCSPacketType packet_type) 101{ 102 MMSContext *mms = &mmst->mms; 103 mms->write_out_ptr = mms->out_buffer; 104 105 bytestream_put_le32(&mms->write_out_ptr, 1); // start sequence 106 bytestream_put_le32(&mms->write_out_ptr, 0xb00bface); 107 bytestream_put_le32(&mms->write_out_ptr, 0); // Length starts from after the protocol type bytes 108 bytestream_put_le32(&mms->write_out_ptr, MKTAG('M','M','S',' ')); 109 bytestream_put_le32(&mms->write_out_ptr, 0); 110 bytestream_put_le32(&mms->write_out_ptr, mmst->outgoing_packet_seq++); 111 bytestream_put_le64(&mms->write_out_ptr, 0); // timestamp 112 bytestream_put_le32(&mms->write_out_ptr, 0); 113 bytestream_put_le16(&mms->write_out_ptr, packet_type); 114 bytestream_put_le16(&mms->write_out_ptr, 3); // direction to server 115} 116 117/** Add prefixes to MMST command packet. */ 118static void insert_command_prefixes(MMSContext *mms, 119 uint32_t prefix1, uint32_t prefix2) 120{ 121 bytestream_put_le32(&mms->write_out_ptr, prefix1); // first prefix 122 bytestream_put_le32(&mms->write_out_ptr, prefix2); // second prefix 123} 124 125/** Send a prepared MMST command packet. */ 126static int send_command_packet(MMSTContext *mmst) 127{ 128 MMSContext *mms = &mmst->mms; 129 int len= mms->write_out_ptr - mms->out_buffer; 130 int exact_length = FFALIGN(len, 8); 131 int first_length= exact_length - 16; 132 int len8= first_length/8; 133 int write_result; 134 135 // update packet length fields. 136 AV_WL32(mms->out_buffer + 8, first_length); 137 AV_WL32(mms->out_buffer + 16, len8); 138 AV_WL32(mms->out_buffer + 32, len8-2); 139 memset(mms->write_out_ptr, 0, exact_length - len); 140 141 // write it out. 142 write_result= ffurl_write(mms->mms_hd, mms->out_buffer, exact_length); 143 if(write_result != exact_length) { 144 av_log(NULL, AV_LOG_ERROR, 145 "Failed to write data of length %d: %d (%s)\n", 146 exact_length, write_result, 147 write_result < 0 ? strerror(AVUNERROR(write_result)) : 148 "The server closed the connection"); 149 return AVERROR(EIO); 150 } 151 152 return 0; 153} 154 155static int mms_put_utf16(MMSContext *mms, const uint8_t *src) 156{ 157 AVIOContext bic; 158 int size = mms->write_out_ptr - mms->out_buffer; 159 int len; 160 ffio_init_context(&bic, mms->write_out_ptr, 161 sizeof(mms->out_buffer) - size, 1, NULL, NULL, NULL, NULL); 162 163 len = avio_put_str16le(&bic, src); 164 if (len < 0) 165 return len; 166 mms->write_out_ptr += len; 167 return 0; 168} 169 170static int send_time_test_data(MMSTContext *mmst) 171{ 172 start_command_packet(mmst, CS_PKT_TIMING_DATA_REQUEST); 173 insert_command_prefixes(&mmst->mms, 0x00f0f0f0, 0x0004000b); 174 return send_command_packet(mmst); 175} 176 177static int send_protocol_select(MMSTContext *mmst) 178{ 179 int ret; 180 char data_string[256]; 181 MMSContext *mms = &mmst->mms; 182 183 start_command_packet(mmst, CS_PKT_PROTOCOL_SELECT); 184 insert_command_prefixes(mms, 0, 0xffffffff); 185 bytestream_put_le32(&mms->write_out_ptr, 0); // maxFunnelBytes 186 bytestream_put_le32(&mms->write_out_ptr, 0x00989680); // maxbitRate 187 bytestream_put_le32(&mms->write_out_ptr, 2); // funnelMode 188 snprintf(data_string, sizeof(data_string), "\\\\%d.%d.%d.%d\\%s\\%d", 189 (LOCAL_ADDRESS>>24)&0xff, 190 (LOCAL_ADDRESS>>16)&0xff, 191 (LOCAL_ADDRESS>>8)&0xff, 192 LOCAL_ADDRESS&0xff, 193 "TCP", // or UDP 194 LOCAL_PORT); 195 196 if ((ret = mms_put_utf16(mms, data_string)) < 0) 197 return ret; 198 return send_command_packet(mmst); 199} 200 201static int send_media_file_request(MMSTContext *mmst) 202{ 203 int ret; 204 MMSContext *mms = &mmst->mms; 205 start_command_packet(mmst, CS_PKT_MEDIA_FILE_REQUEST); 206 insert_command_prefixes(mms, 1, 0xffffffff); 207 bytestream_put_le32(&mms->write_out_ptr, 0); 208 bytestream_put_le32(&mms->write_out_ptr, 0); 209 if ((ret = mms_put_utf16(mms, mmst->path + 1)) < 0) // +1 for skip "/" 210 return ret; 211 212 return send_command_packet(mmst); 213} 214 215static void handle_packet_stream_changing_type(MMSTContext *mmst) 216{ 217 MMSContext *mms = &mmst->mms; 218 av_dlog(NULL, "Stream changing!\n"); 219 220 // 40 is the packet header size, 7 is the prefix size. 221 mmst->header_packet_id= AV_RL32(mms->in_buffer + 40 + 7); 222 av_dlog(NULL, "Changed header prefix to 0x%x", mmst->header_packet_id); 223} 224 225static int send_keepalive_packet(MMSTContext *mmst) 226{ 227 // respond to a keepalive with a keepalive... 228 start_command_packet(mmst, CS_PKT_KEEPALIVE); 229 insert_command_prefixes(&mmst->mms, 1, 0x100FFFF); 230 return send_command_packet(mmst); 231} 232 233/** Pad media packets smaller than max_packet_size and/or adjust read position 234 * after a seek. */ 235static void pad_media_packet(MMSContext *mms) 236{ 237 if(mms->remaining_in_len<mms->asf_packet_len) { 238 int padding_size = mms->asf_packet_len - mms->remaining_in_len; 239 memset(mms->in_buffer + mms->remaining_in_len, 0, padding_size); 240 mms->remaining_in_len += padding_size; 241 } 242} 243 244/** Read incoming MMST media, header or command packet. */ 245static MMSSCPacketType get_tcp_server_response(MMSTContext *mmst) 246{ 247 int read_result; 248 MMSSCPacketType packet_type= -1; 249 MMSContext *mms = &mmst->mms; 250 for(;;) { 251 read_result = ffurl_read_complete(mms->mms_hd, mms->in_buffer, 8); 252 if (read_result != 8) { 253 if(read_result < 0) { 254 av_log(NULL, AV_LOG_ERROR, 255 "Error reading packet header: %d (%s)\n", 256 read_result, strerror(AVUNERROR(read_result))); 257 packet_type = SC_PKT_CANCEL; 258 } else { 259 av_log(NULL, AV_LOG_ERROR, 260 "The server closed the connection\n"); 261 packet_type = SC_PKT_NO_DATA; 262 } 263 return packet_type; 264 } 265 266 // handle command packet. 267 if(AV_RL32(mms->in_buffer + 4)==0xb00bface) { 268 int length_remaining, hr; 269 270 mmst->incoming_flags= mms->in_buffer[3]; 271 read_result= ffurl_read_complete(mms->mms_hd, mms->in_buffer+8, 4); 272 if(read_result != 4) { 273 av_log(NULL, AV_LOG_ERROR, 274 "Reading command packet length failed: %d (%s)\n", 275 read_result, 276 read_result < 0 ? strerror(AVUNERROR(read_result)) : 277 "The server closed the connection"); 278 return read_result < 0 ? read_result : AVERROR(EIO); 279 } 280 281 length_remaining= AV_RL32(mms->in_buffer+8) + 4; 282 av_dlog(NULL, "Length remaining is %d\n", length_remaining); 283 // read the rest of the packet. 284 if (length_remaining < 0 285 || length_remaining > sizeof(mms->in_buffer) - 12) { 286 av_log(NULL, AV_LOG_ERROR, 287 "Incoming packet length %d exceeds bufsize %"SIZE_SPECIFIER"\n", 288 length_remaining, sizeof(mms->in_buffer) - 12); 289 return AVERROR_INVALIDDATA; 290 } 291 read_result = ffurl_read_complete(mms->mms_hd, mms->in_buffer + 12, 292 length_remaining) ; 293 if (read_result != length_remaining) { 294 av_log(NULL, AV_LOG_ERROR, 295 "Reading pkt data (length=%d) failed: %d (%s)\n", 296 length_remaining, read_result, 297 read_result < 0 ? strerror(AVUNERROR(read_result)) : 298 "The server closed the connection"); 299 return read_result < 0 ? read_result : AVERROR(EIO); 300 } 301 packet_type= AV_RL16(mms->in_buffer+36); 302 if (read_result >= 44 && (hr = AV_RL32(mms->in_buffer + 40))) { 303 av_log(NULL, AV_LOG_ERROR, 304 "Server sent a message with packet type 0x%x and error status code 0x%08x\n", packet_type, hr); 305 return AVERROR(EINVAL); 306 } 307 } else { 308 int length_remaining; 309 int packet_id_type; 310 int tmp; 311 312 // note we cache the first 8 bytes, 313 // then fill up the buffer with the others 314 tmp = AV_RL16(mms->in_buffer + 6); 315 length_remaining = (tmp - 8) & 0xffff; 316 mmst->incoming_packet_seq = AV_RL32(mms->in_buffer); 317 packet_id_type = mms->in_buffer[4]; 318 mmst->incoming_flags = mms->in_buffer[5]; 319 320 if (length_remaining < 0 321 || length_remaining > sizeof(mms->in_buffer) - 8) { 322 av_log(NULL, AV_LOG_ERROR, 323 "Data length %d is invalid or too large (max=%"SIZE_SPECIFIER")\n", 324 length_remaining, sizeof(mms->in_buffer)); 325 return AVERROR_INVALIDDATA; 326 } 327 mms->remaining_in_len = length_remaining; 328 mms->read_in_ptr = mms->in_buffer; 329 read_result= ffurl_read_complete(mms->mms_hd, mms->in_buffer, length_remaining); 330 if(read_result != length_remaining) { 331 av_log(NULL, AV_LOG_ERROR, 332 "Failed to read packet data of size %d: %d (%s)\n", 333 length_remaining, read_result, 334 read_result < 0 ? strerror(AVUNERROR(read_result)) : 335 "The server closed the connection"); 336 return read_result < 0 ? read_result : AVERROR(EIO); 337 } 338 339 // if we successfully read everything. 340 if(packet_id_type == mmst->header_packet_id) { 341 int err; 342 packet_type = SC_PKT_ASF_HEADER; 343 // Store the asf header 344 if(!mms->header_parsed) { 345 if ((err = av_reallocp(&mms->asf_header, 346 mms->asf_header_size + 347 mms->remaining_in_len)) < 0) { 348 mms->asf_header_size = 0; 349 return err; 350 } 351 memcpy(mms->asf_header + mms->asf_header_size, 352 mms->read_in_ptr, mms->remaining_in_len); 353 mms->asf_header_size += mms->remaining_in_len; 354 } 355 // 0x04 means asf header is sent in multiple packets. 356 if (mmst->incoming_flags == 0x04) 357 continue; 358 } else if(packet_id_type == mmst->packet_id) { 359 packet_type = SC_PKT_ASF_MEDIA; 360 } else { 361 av_dlog(NULL, "packet id type %d is old.", packet_id_type); 362 continue; 363 } 364 } 365 366 // preprocess some packet type 367 if(packet_type == SC_PKT_KEEPALIVE) { 368 send_keepalive_packet(mmst); 369 continue; 370 } else if(packet_type == SC_PKT_STREAM_CHANGING) { 371 handle_packet_stream_changing_type(mmst); 372 } else if(packet_type == SC_PKT_ASF_MEDIA) { 373 pad_media_packet(mms); 374 } 375 return packet_type; 376 } 377} 378 379static int mms_safe_send_recv(MMSTContext *mmst, 380 int (*send_fun)(MMSTContext *mmst), 381 const MMSSCPacketType expect_type) 382{ 383 MMSSCPacketType type; 384 if(send_fun) { 385 int ret = send_fun(mmst); 386 if (ret < 0) { 387 av_dlog(NULL, "Send Packet error before expecting recv packet %d\n", expect_type); 388 return ret; 389 } 390 } 391 392 if ((type = get_tcp_server_response(mmst)) != expect_type) { 393 av_log(NULL, AV_LOG_ERROR, 394 "Corrupt stream (unexpected packet type 0x%x, expected 0x%x)\n", 395 type, expect_type); 396 return AVERROR_INVALIDDATA; 397 } else { 398 return 0; 399 } 400} 401 402static int send_media_header_request(MMSTContext *mmst) 403{ 404 MMSContext *mms = &mmst->mms; 405 start_command_packet(mmst, CS_PKT_MEDIA_HEADER_REQUEST); 406 insert_command_prefixes(mms, 1, 0); 407 bytestream_put_le32(&mms->write_out_ptr, 0); 408 bytestream_put_le32(&mms->write_out_ptr, 0x00800000); 409 bytestream_put_le32(&mms->write_out_ptr, 0xffffffff); 410 bytestream_put_le32(&mms->write_out_ptr, 0); 411 bytestream_put_le32(&mms->write_out_ptr, 0); 412 bytestream_put_le32(&mms->write_out_ptr, 0); 413 414 // the media preroll value in milliseconds? 415 bytestream_put_le32(&mms->write_out_ptr, 0); 416 bytestream_put_le32(&mms->write_out_ptr, 0x40AC2000); 417 bytestream_put_le32(&mms->write_out_ptr, 2); 418 bytestream_put_le32(&mms->write_out_ptr, 0); 419 420 return send_command_packet(mmst); 421} 422 423/** Send the initial handshake. */ 424static int send_startup_packet(MMSTContext *mmst) 425{ 426 char data_string[256]; 427 int ret; 428 MMSContext *mms = &mmst->mms; 429 // SubscriberName is defined in MS specification linked below. 430 // The guid value can be any valid value. 431 // http://download.microsoft.com/ 432 // download/9/5/E/95EF66AF-9026-4BB0-A41D-A4F81802D92C/%5BMS-WMSP%5D.pdf 433 snprintf(data_string, sizeof(data_string), 434 "NSPlayer/7.0.0.1956; {%s}; Host: %s", 435 "7E667F5D-A661-495E-A512-F55686DDA178", mmst->host); 436 437 start_command_packet(mmst, CS_PKT_INITIAL); 438 insert_command_prefixes(mms, 0, 0x0004000b); 439 bytestream_put_le32(&mms->write_out_ptr, 0x0003001c); 440 if ((ret = mms_put_utf16(mms, data_string)) < 0) 441 return ret; 442 return send_command_packet(mmst); 443} 444 445/** Send MMST stream selection command based on the AVStream->discard values. */ 446static int send_stream_selection_request(MMSTContext *mmst) 447{ 448 int i; 449 MMSContext *mms = &mmst->mms; 450 // send the streams we want back... 451 start_command_packet(mmst, CS_PKT_STREAM_ID_REQUEST); 452 bytestream_put_le32(&mms->write_out_ptr, mms->stream_num); // stream nums 453 for(i= 0; i<mms->stream_num; i++) { 454 bytestream_put_le16(&mms->write_out_ptr, 0xffff); // flags 455 bytestream_put_le16(&mms->write_out_ptr, mms->streams[i].id); // stream id 456 bytestream_put_le16(&mms->write_out_ptr, 0); // selection 457 } 458 return send_command_packet(mmst); 459} 460 461static int send_close_packet(MMSTContext *mmst) 462{ 463 start_command_packet(mmst, CS_PKT_STREAM_CLOSE); 464 insert_command_prefixes(&mmst->mms, 1, 1); 465 466 return send_command_packet(mmst); 467} 468 469/** Close the MMSH/MMST connection */ 470static int mms_close(URLContext *h) 471{ 472 MMSTContext *mmst = (MMSTContext *)h->priv_data; 473 MMSContext *mms = &mmst->mms; 474 if(mms->mms_hd) { 475 send_close_packet(mmst); 476 ffurl_close(mms->mms_hd); 477 } 478 479 /* free all separately allocated pointers in mms */ 480 av_free(mms->streams); 481 av_free(mms->asf_header); 482 483 return 0; 484} 485 486static int send_media_packet_request(MMSTContext *mmst) 487{ 488 MMSContext *mms = &mmst->mms; 489 start_command_packet(mmst, CS_PKT_START_FROM_PKT_ID); 490 insert_command_prefixes(mms, 1, 0x0001FFFF); 491 bytestream_put_le64(&mms->write_out_ptr, 0); // seek timestamp 492 bytestream_put_le32(&mms->write_out_ptr, 0xffffffff); // unknown 493 bytestream_put_le32(&mms->write_out_ptr, 0xffffffff); // packet offset 494 bytestream_put_byte(&mms->write_out_ptr, 0xff); // max stream time limit 495 bytestream_put_byte(&mms->write_out_ptr, 0xff); // max stream time limit 496 bytestream_put_byte(&mms->write_out_ptr, 0xff); // max stream time limit 497 bytestream_put_byte(&mms->write_out_ptr, 0x00); // stream time limit flag 498 499 mmst->packet_id++; // new packet_id 500 bytestream_put_le32(&mms->write_out_ptr, mmst->packet_id); 501 return send_command_packet(mmst); 502} 503 504 505static void clear_stream_buffers(MMSContext *mms) 506{ 507 mms->remaining_in_len = 0; 508 mms->read_in_ptr = mms->in_buffer; 509} 510 511static int mms_open(URLContext *h, const char *uri, int flags) 512{ 513 MMSTContext *mmst = h->priv_data; 514 MMSContext *mms; 515 int port, err; 516 char tcpname[256]; 517 518 h->is_streamed = 1; 519 mms = &mmst->mms; 520 521 // only for MMS over TCP, so set proto = NULL 522 av_url_split(NULL, 0, NULL, 0, 523 mmst->host, sizeof(mmst->host), &port, mmst->path, 524 sizeof(mmst->path), uri); 525 526 if(port<0) 527 port = 1755; // defaut mms protocol port 528 529 // establish tcp connection. 530 ff_url_join(tcpname, sizeof(tcpname), "tcp", NULL, mmst->host, port, NULL); 531 err = ffurl_open(&mms->mms_hd, tcpname, AVIO_FLAG_READ_WRITE, 532 &h->interrupt_callback, NULL); 533 if (err) 534 goto fail; 535 536 mmst->packet_id = 3; // default, initial value. 537 mmst->header_packet_id = 2; // default, initial value. 538 err = mms_safe_send_recv(mmst, send_startup_packet, SC_PKT_CLIENT_ACCEPTED); 539 if (err) 540 goto fail; 541 err = mms_safe_send_recv(mmst, send_time_test_data, SC_PKT_TIMING_TEST_REPLY); 542 if (err) 543 goto fail; 544 err = mms_safe_send_recv(mmst, send_protocol_select, SC_PKT_PROTOCOL_ACCEPTED); 545 if (err) 546 goto fail; 547 err = mms_safe_send_recv(mmst, send_media_file_request, SC_PKT_MEDIA_FILE_DETAILS); 548 if (err) 549 goto fail; 550 err = mms_safe_send_recv(mmst, send_media_header_request, SC_PKT_HEADER_REQUEST_ACCEPTED); 551 if (err) 552 goto fail; 553 err = mms_safe_send_recv(mmst, NULL, SC_PKT_ASF_HEADER); 554 if (err) 555 goto fail; 556 if((mmst->incoming_flags != 0X08) && (mmst->incoming_flags != 0X0C)) { 557 av_log(NULL, AV_LOG_ERROR, 558 "The server does not support MMST (try MMSH or RTSP)\n"); 559 err = AVERROR(EINVAL); 560 goto fail; 561 } 562 err = ff_mms_asf_header_parser(mms); 563 if (err) { 564 av_dlog(NULL, "asf header parsed failed!\n"); 565 goto fail; 566 } 567 mms->header_parsed = 1; 568 569 if (!mms->asf_packet_len || !mms->stream_num) 570 goto fail; 571 572 clear_stream_buffers(mms); 573 err = mms_safe_send_recv(mmst, send_stream_selection_request, SC_PKT_STREAM_ID_ACCEPTED); 574 if (err) 575 goto fail; 576 // send media packet request 577 err = mms_safe_send_recv(mmst, send_media_packet_request, SC_PKT_MEDIA_PKT_FOLLOWS); 578 if (err) { 579 goto fail; 580 } 581 av_dlog(NULL, "Leaving open (success)\n"); 582 return 0; 583fail: 584 mms_close(h); 585 av_dlog(NULL, "Leaving open (failure: %d)\n", err); 586 return err; 587} 588 589/** Read ASF data through the protocol. */ 590static int mms_read(URLContext *h, uint8_t *buf, int size) 591{ 592 /* TODO: see tcp.c:tcp_read() about a possible timeout scheme */ 593 MMSTContext *mmst = h->priv_data; 594 MMSContext *mms = &mmst->mms; 595 int result = 0; 596 597 do { 598 if(mms->asf_header_read_size < mms->asf_header_size) { 599 /* Read from ASF header buffer */ 600 result = ff_mms_read_header(mms, buf, size); 601 } else if(mms->remaining_in_len) { 602 /* Read remaining packet data to buffer. 603 * the result can not be zero because remaining_in_len is positive.*/ 604 result = ff_mms_read_data(mms, buf, size); 605 } else { 606 /* Read from network */ 607 int err = mms_safe_send_recv(mmst, NULL, SC_PKT_ASF_MEDIA); 608 if (err == 0) { 609 if(mms->remaining_in_len>mms->asf_packet_len) { 610 av_log(NULL, AV_LOG_ERROR, 611 "Incoming pktlen %d is larger than ASF pktsize %d\n", 612 mms->remaining_in_len, mms->asf_packet_len); 613 result= AVERROR(EIO); 614 } else { 615 // copy the data to the packet buffer. 616 result = ff_mms_read_data(mms, buf, size); 617 if (result == 0) { 618 av_dlog(NULL, "Read ASF media packet size is zero!\n"); 619 break; 620 } 621 } 622 } else { 623 av_dlog(NULL, "read packet error!\n"); 624 break; 625 } 626 } 627 } while(!result); // only return one packet. 628 return result; 629} 630 631URLProtocol ff_mmst_protocol = { 632 .name = "mmst", 633 .url_open = mms_open, 634 .url_read = mms_read, 635 .url_close = mms_close, 636 .priv_data_size = sizeof(MMSTContext), 637 .flags = URL_PROTOCOL_FLAG_NETWORK, 638}; 639